Comments (3)
Sigma is way more specific (up to technically parseable) with the logsource
section.
If I am not misunderstanding DS is the datasource mapping of MITRE, not "detection ID". So this would be a static mapping of logsource to DS. I don't really see the benefit because as I said the logsource information is of higher quality than the MITRE DS information.
I understand that these datasource ids could be used downstream for mapping but I don't feel like manually doing duplicate work during rule creation. But that's just my personal opinion. Let's see what others think.
from sigma.
Welcome @AdmU3 👋
It looks like this is your first issue on the Sigma rules repository!
The following repository accepts issues related to false positives
or 'rule ideas'.
If you're reporting an issue related to the pySigma library please consider submitting it here
If you're reporting an issue related to the deprecated sigmac library please consider submitting it here
Thanks for taking the time to open this issue, and welcome to the Sigma community! 😃
from sigma.
Thank you, I got your point, I will add the combined DS id and technique in the rule name .
I believe checking the technique id along with the data source id in the MITRE will provide better understanding for the rule " Detects column"
from sigma.
Related Issues (20)
- proc_creation_win_susp_bad_opsec_sacrificial_processes Chrome Installer False Positives HOT 2
- False positive: File Download From Browser Process Via Inline Link HOT 6
- Detection of Rhysida Ransomware HOT 1
- `documentations/tools/sigma-logsource-checker.py` is broken HOT 1
- Logsources, lack of machine readable definition of log sources (and additional requirements) HOT 4
- Excessive requests from Go-http-client/1.1 HOT 3
- net_connection_win_rundll32_net_connections.yml leads to false positive via multiple vendors HOT 4
- Adding new hosting sites to downloading rules HOT 3
- Lazagne Crendential Dumping Tool Detection Rule HOT 1
- Hacktool Evil-Winrm Tool Detection via Powershell event ID
- CVE-2023-1389 Unauthenticated Command Injection Vulnerability
- Suspicious Process DNS Query Known Abuse Web Services
- FPs with "File Enumeration Via Dir Command"
- ADS Zone.Identifier Deleted By Uncommon Application when installing PuTTy latest version HOT 1
- DPAPI backup keys Theft and Export related activities HOT 1
- Detects Backdoor Kapeka Via Registry Key
- Windows LAPS Credential Dump via Entra ID HOT 1
- Can I use regular expression in sigma? HOT 1
- Update of Rare Service Install Detection Rule to use correlation syntax HOT 4
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from sigma.